FreeDOS

Before September 1995, Microsoft Windows was an MS-DOS program. DOS was an easy to use command line operating system that provided you with complete ability to control and troubleshoot your computer. Microsoft's goal was to eliminate DOS, possibly to prevent you from having complete control of your own computer.

The last stand-alone version of MS-DOS was version 6. Unfortunately, that version is not Y2K compliant. Windows 95 and later came with MS-DOS version 7. Unfortunately, that version is too integrated with the operating system. It will not work without access to your hard disk.

FreeDOS is a PC compatible Y2K compliant DOS that you can download from www.freedos.org. FreeDOS fits on a single floppy disk and can be used to boot your computer. Download and unzip the file odin7bin.zip (756KB). Unziping will create the files diskcopy.exe and fdodin07.144. Put a blank formatted floppy disk in the drive. In the Start | Run dialog box, or at a command prompt type "diskcopy fdodin07.144 a:" to create a bootable FreeDOS floppy disk.

Why would you want to boot your computer with DOS? Maybe you want to use Windows XP without product activation.

First make sure that the BIOS boot sequence on your computer is configured with the floppy drive as the first boot device (or at least before the C: drive). To get to the BIOS configuration screen, press the "Delete" or "F2" key (depending upon your BIOS) while your computer is starting.

Insert the FreeDOS floppy disk in the floppy drive and start the computer. At the A:>_ prompt type DATE. FreeDOS will return your computer's current date, along with a prompt to enter a new date. Enter the date that you installed Windows XP (or at least a date before the 30 day expiration date). Remove the FreeDOS floppy disk and restart your computer.

Note: This will only work if Windows XP has never been started after the 30 day expiration date. The first time Windows XP is started after the 30 day expiration date will be the last time it starts.

Every time you start your computer, start it first with FreeDOS and reset the computer's date to the date that you installed Windows XP. Windows XP will think time has come to a standstill.

Note: Of course, Your file creation and last modified dates will not be correct, so this is not really a way for a serious user to bypass Windows XP product activation. However for certain purposes, like learning the Windows XP operating system, this can be a way to use Windows XP without product activation.

Microsoft should have made the expiration period much longer than 30 days. Maybe they want you to activate Windows XP before it crashes.

Permission is granted for the below article to forward, reprint, distribute, use for ezine, newsletter, website, offer as free bonus or part of a product for sale as long as no changes are made and the byline, copyright, and the resource box below is included.

About The Author

Copyright(C)2004 Bucaro TecHelp. To learn how to maintain your computer and use it more effectively to design a Web site and make money on the Web visit bucarotechelp.com To subscribe to Bucaro TecHelp Newsletter Send a blank email to bucarotechelp.com

cleaning help near Mundelein ..
In The News:

Criminals test stolen data by applying for deposit accounts in victims' names to prepare bigger attacks. Learn why banks won't share fraud details.
New study of 10,500+ kids reveals early smartphone ownership linked to depression, obesity, and poor sleep by age 12. Earlier phones mean higher risks.
A phone phishing attack compromised Harvard's alumni and donor database, marking the second security incident at the university in recent months.
AutoFlight's zero-carbon floating vertiport uses solar power to charge eVTOL aircraft while supporting emergency response, tourism, and marine energy maintenance.
A new phone return scam targets recent buyers with fake carrier calls. Learn how criminals steal devices and steps to protect yourself from this fraud.
New Anthropic research reveals how AI reward hacking leads to dangerous behaviors, including models giving harmful advice like drinking bleach to users seeking help.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Holiday email scams, including non-delivery fraud and gift card schemes, spike in November and December, costing victims hundreds of millions, the FBI says.
Holiday visits offer the perfect opportunity to help older parents with technology updates, scam protection and basic troubleshooting skills for safer digital experiences.
Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.
Essential phone settings to enable before losing your device, including Find My network, location services and security features for iPhone and Android.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Cybersecurity research shows weak passwords remain a major threat, with simple patterns and number sequences putting millions of accounts at risk.
New Android malware BankBot YNRK silences phones, steals banking data and drains crypto wallets automatically. Learn how this advanced threat works.

Microsoft CRM: Implementation, Customization, Support ? Consultant Overview

Microsoft Business Solutions CRM is present several years on the... Read More

3 Reasons Why Medical Billing Software is Leading the Way

Since technology changes so quickly, it is hard to begin... Read More

C++ Function Templates

C++ Function templates are those functions which can handle different... Read More

Enterprise Resource Planning Overview

ERP (Enterprise Resource Planning) Overview covers What is ERP, Brief... Read More

Theres Gold in Your Websites Server Log

Many Webmasters have never bothered to view their website's server... Read More

Bill of Lading ? Custom Reporting for Microsoft Great Plains ? Overview for Consultant

Bill of Lading is required report for Logistics and Freight... Read More

Ukraine IT Myths Dispersed

While Ukraine is becoming a new popular IT outsourcing destination,... Read More

Fleet Maintenance Software Reviews

Innovative Maintenance Systems (IMS) is one company that offers solutions... Read More

Free Software - Powerful Alternatives to Budget-Busting Software

When you buy a computer, it most likely comes with... Read More

Monitoring Software Can be Used for Spying as Well

We all already got used to computer monitoring both at... Read More

The Dirt on Screensavers

Remember back in the days where screensavers were the coolest... Read More

Simple Solution for Php Includes - IFrames

I have recently created my first Php program. I wanted... Read More

Groupware: What Works the Way Businesses Do?

GroupwareThe internet is full of 1.5 million to 7 million... Read More

Microsoft Office Selecting Secrets

Stop the Runaway MouseWhat's the "runaway mouse?" You've seen it...you... Read More

Microsoft CRM Lotus Notes Domino Connector FAQ

Microsoft Business Solutions CRM and IBM Lotus Notes Domino, being... Read More

Microsoft CRM or Siebel

Siebel is traditional CRM market leader, however and mostly due... Read More

Great Plains Dexterity ? Microsoft Great Plains Customization Overview

Microsoft Business Solutions Great Plains, former Great Plains Software Dynamics... Read More

Great Plains Accounting Migration to Microsoft Great Plains - Overview for IT Specialist

This is a short article, written in question/answer/FAQ style to... Read More

Google Brings the Earth to Your Desktop

Google Inc. has launched a new software package that allows... Read More

Databases ? How We Love to Hate Them!

You've finally created databases that you can actually use to... Read More

Microsoft CRM Implementation & Customization: MS CRM Fax Gateway

With this small article we are continuing Microsoft Business Solutions... Read More

Did You Ever Want to Completely Erase Everything on Your Computer?

Did you ever want to erase everything on your computer?... Read More

The Truth about Colossus: Are You Just A Magnetic Image?

What is Colossus?Colossus is software licensed to about twenty-five insurance... Read More

Artificial Intelligence And Intuition

The intuitive algorithm.Roger Penrose considered it impossible. Thinking could never... Read More

Microsoft Great Plains POP: Purchase Order Processing ? Overview For Consultants

Great Plains Purchase Order Processing (POP) module makes up one-third... Read More

reliable maid service Wilmette ..